MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 2865a12b350dd2ea38de20b7b2a97f968c929114e408fa901b1e5a100b7c5ef4. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 4


Intelligence 4 IOCs YARA File information Comments

SHA256 hash: 2865a12b350dd2ea38de20b7b2a97f968c929114e408fa901b1e5a100b7c5ef4
SHA3-384 hash: 56a2560597fe74d9441b04e17a320d75768de3332f25b3e65126bcbf73694f9f9abf47d1b96ec18207282cab55abe7c0
SHA1 hash: adb2d3b58dbad82db72d4350c7b5544257287361
MD5 hash: 683bb2af463da72180707122c28a36e9
humanhash: sink-march-butter-montana
File name:Ovbm.exe
Download: download sample
Signature AgentTesla
File size:448'000 bytes
First seen:2020-06-08 12:44:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash c2189e4af44925dc118507f063755e89 (2 x AgentTesla)
ssdeep 12288:8dPtb7MgT2HIovZq8Ccoq4McalWmncimv1TTd:8xt8HRxquF4zalWmnZ0tT
Threatray 11'031 similar samples on MalwareBazaar
TLSH 56941281EB4114B5F00C497AD62B2E71A69DF01A7B8E2F115F258ACEF7B09F77B11902
Reporter abuse_ch
Tags:AgentTesla exe


Avatar
abuse_ch
Malspam distributing AgentTesla:

HELO: mail.selatours.at
Sending IP: 62.218.79.250
From: dhlSender@dhl.com <dhlSender@dlhl.com>
Subject: DHL Shipment Returned/On Demand Delivery
Attachment: DHLCBJ191245168642_ExpressNotification.docm

AgentTesla payload URL:
http://www.nesilgroup.com.tr/wp-content/Ovbm.exe

AgentTesla SMTP exfil server:
mail.stalexinc.com:587

Intelligence


File Origin
# of uploads :
1
# of downloads :
69
Origin country :
n/a
Vendor Threat Intelligence
Gathering data
Threat name:
Win32.Trojan.LokiBot
Status:
Malicious
First seen:
2020-06-08 12:45:05 UTC
AV detection:
25 of 29 (86.21%)
Threat level:
  5/5
Result
Malware family:
agenttesla
Score:
  10/10
Tags:
family:agenttesla keylogger persistence spyware stealer trojan upx
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Modifies service
Suspicious use of SetThreadContext
Adds Run key to start application
Reads data files stored by FTP clients
Reads user/profile data of local email clients
Reads user/profile data of web browsers
UPX packed file
AgentTesla Payload
AgentTesla
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Executable exe 2865a12b350dd2ea38de20b7b2a97f968c929114e408fa901b1e5a100b7c5ef4

(this sample)

  
Delivery method
Distributed via web download

Comments